Changes between Version 37 and Version 38 of GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute


Ignore:
Timestamp:
01/31/17 14:45:53 (7 years ago)
Author:
pjayanth@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute

    v37 v38  
    166166}}}
    167167
    168 When the Wireshark window pops up, you might still have to choose eth0 for a live capture.  And you will want to use a filter to cut down on the chatter in the Wireshark window.   One such filter might be to see what shows up on port 6653. To do that type ''' ''tcp.port eq 6653'' ''' in the filter window, assuming that 6653 is the port that the controller is listening on.   Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content.
     168When the Wireshark window pops up, you might still have to choose eth0 for a live capture.  And you will want to use a filter to cut down on the chatter in the Wireshark window.   One such filter might be to see what shows up on port 6653. To do that type ''' ''tcp.port eq 6633'' ''' in the filter window, assuming that 6633 is the port that the controller is listening on.   Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content.
    169169
    170170